Courses › Course Catalog

AOTMP Online Course Catalog

Need help deciding what’s best for you?

Filter by topic

Online courses

(ADP) Understanding US Data Privacy Laws

Unlike other regions of the world, the United States does not have a single set of data privacy regulations. Instead, multiple laws focus on data privacy and the expectation is that companies will know which ones govern their industry. This lesson provides learners with a better understanding of the regulations

View course ›

(ALT) Auditing Lifecycle and Tools

Organizations can gain significant benefits from an auditing program. In this course, explore examples of process improvement and cost savings and review AOTMP® recommendations and components of a successful auditing program based on the Efficiency First® Framework.

View course ›

(AMI) Auditing Mobile Telecom Invoices

Auditing mobile telecom invoices may uncover billing errors that negatively impact the enterprise mobility management plan. This course uses sample invoices to show the learner what components to expect in their mobile invoices and demonstrate the process of auditing these documents.

View course ›

(AMN) Auditing Materials

To be well-prepared for an invoice-to-contract or invoice-to-tariff audit, it is important to build a catalog of supporting materials to validate billing and service accuracy. You also need to understand how to effectively read and use the supporting materials during the audit process. This course identifies the necessities required to

View course ›

(APS) Auditing Packet Switched Circuits and Services

Packet-switched services such as frame relay and MPLS have taken the place of their circuit-switched alternatives in many telecom environments. The biggest pros include flexibility and network scalability, while the biggest con is invoice intricacy. This course examines packet-switched invoices to demonstrate error identification and cost reduction opportunities.

View course ›

(ATA) After The Audit

Explore ways to use the results of a telecom audit to improve performance in your environment. This course explains how to use the results of the audit to illustrate how an efficient telecom environment adds value to the organization.

View course ›

(ATP100) Alleviating Telecom Pain Points

An organization’s telecom options increase every day. From landlines or mobile calls to online forums or chat bots, options are multiplying—and each option provides its own opportunity for inefficiency. These pain points often keep telecom managers busy solving problems that did not exist with the previous solution. With a focus

View course ›

(BCA100) Building a Business Case for Auditing

In order to gain organizational buy-in to create an ongoing audit program, you will need to prepare a compelling business case. This course helps participants understand what such a business case should contain. In this course, not only will they learn all the components of a requirement assessment and business

View course ›

(BCT100) Building a Business Case for a TEM Program

Nearly one-third of organizations indicate that one of their top challenges in establishing a Telecom Expense Management (TEM) program is creating a business justification. This course provides an overview of telecom expense management, answers questions when one needs to justify the need for TEM and provides clear instructions on how

View course ›

(BSA) TEM Business Systems & Automation

This course explores the business systems that support a technology expense management (TEM) program and is ideal for all technology management practitioners and leaders. Throughout this course subject matter expert Timothy C. Colwell will share best practices for identifying business systems and data sources in a TEM program as well

View course ›

(CAP) Cost Containment and Cost Avoidance Practices

As corporate telecom requirements continue to grow, so does the need to contain and avoid unnecessary expenses. Shifts in technology and technology applications are driving the demand for more efficient ways to manage the cost of new technologies. Business needs are also dictating increased attention on wireless services. This course

View course ›

(CCC) Contract Catalogs & Compliance Validation

Contracts are the foundation of your organization’s business relationship with vendors. Comprehensive contract management activities should be part of every fixed and mobile telecom environment. This course examines the benefits and documents within a contract catalog as well as contract compliance.

View course ›

(CCP) Understanding the California Consumer Privacy Act

This course provides an overview of the California Consumer Privacy Act and how it might impact your organization. Upon completion of the course, your organization will be better equipped to make policy-related decisions. This course includes a history of the CCPA, an overview of its scope, an explanation of the

View course ›

(CEM) Change Management: Executing & Monitoring Change

This course focuses on the next step of Change Management–the execution and monitoring of the change. Learners will be introduced to a process lifecycle, which is always in need of updating and refining, as well as five business principles to monitor while executing the change within your telecom environment.

View course ›

(CHM) Effectively Managing Change

Telecom service moves, adds, changes and disconnects (MACDs) are common activities that can have a major impact on a telecom budget. However, changes in the telecom environment are not just limited to technical and financial. Learn detailed processes for executing a variety of successful change initiatives.

View course ›

(CLM100) Introduction to Cloud Management

Migrating an enterprise’s technology to the cloud is an important transition that requires detailed decision making and organization. This course will provide participants with a better understanding of what cloud computing is and what the major management models can provide. Using terminology and concepts learned in this course, participants will

View course ›

(CLM101) Basics of Cloud Management

The cloud environment is a complex place that requires organizations to examine what their business needs are. This course will provide participants with a detailed breakdown of this environment, along with examples of the types of organizations that would use each model. Additionally, in this course, you will learn the

View course ›

(CLM102) Audit & Optimization for Cloud

Using knowledge gained from prior cloud management courses, this audit and optimization course shows learners the optimal cloud environment and teaches them fundamental roles and tasks within that environment. It also provides learners with a background on both technical and financial cloud audits. This course benefited from the assistance of

View course ›

(CLM204) Intermediate Audit & Optimization

Expanding on the lessons learned in (CLM102) Audit & Optimization for Cloud, this course provides learners with technical steps required to complete a cloud audit. Utilizing real-world scenarios, this course provides multiple examples of cloud licensing, storage, and security auditing. This course benefited from the assistance of Shauna Heydecker, National

View course ›

(CMF) Contract Management Fundamentals

This course focuses on how to manage telecom contracts. It is geared towards someone who needs to manage telecom contracts or wants to understand telecom contract management in general. This course highlights the most common considerations and best practices for telecom contract management.

View course ›

(CMP) Change Management: Preparation

The first, and arguably the most important, phase of change management is preparation. In this course, you will be introduced to what change management is, the underlying principle, and what should be taken into consideration when contemplating change. Learn catalysts for change in an organization and who/what can be affected.

View course ›

(CO01) Cloud Optimization Primer

This course, a primer on cloud optimization practices, is ideal for all technology management practitioners and leaders. Throughout this course you will learn best practices from subject matter expert Dave Shepard, EVP Sales & Marketing at CloudAdmin, that address the cloud cost, reliability, and performance optimization goals of

View course ›

(COEP01) Center of Excellence Primer

This course, a primer on Telecom, Mobility, and IT Management Center of Excellence (CoE) purpose, principles, and performance, is ideal for all technology management practitioners and leaders. Throughout this course you will learn best practices from subject matter expert Timothy C. Colwell that will help you elevate the business value

View course ›

(CPP) Change Management: Project Planning

This change management course provides you with an in-depth look into the project planning process. You will become familiar with the process for creating a robust, holistic project plan draft as well as the other components that make up the project planning process.

View course ›

(CSR) Customer Service Record Interpretation Practices

Customer Service Records (CSRs) provide valuable configuration details regarding local exchange carrier services. The information contained on a CSR assists telecom/IT professionals as they build service inventories, audit monthly recurring charges, and validate service configuration accuracy. While CSRs support various initiatives, these documents are riddled with complex order codes and

View course ›

(CSX) Cloud Services: XaaS

Numerous organizations across the globe are exploring Anything as-a-Service (XaaS) models for cloud. However, few are prepared to support these cloud services XaaS initiatives because they lack a clear plan and strategy. This course highlights the most common considerations for cloud services XaaS and features expert guidance for overcoming your

View course ›

(CX01) Internal Service Delivery Customer Experience (CX) Primer

This course, a primer on internal service delivery customer experience practices, is ideal for all technology management practitioners and leaders. Throughout this course you will learn best practices from subject matter expert Mike Mehterian that elevate the value of telecom, mobility, and IT service delivery across your organization

View course ›

(DMG) Dispute Management

This course explores the challenges relating to vendor dispute management and suggests a standard process to follow for all types of disputes. Additionally, you will learn the types of questions you should ask yourself in each of those steps and the best practices for managing the dispute process.

View course ›

(DPI) Understanding Data Protection Impact Assessments

This introductory course provides an overview of Data Protection Impact Assessments. It includes a brief overview of where they originated along with step-by-step instructions on how to complete, implement, and maintain a Data Protection Impact Assessment. This course includes a complimentary template that you can utilize when completing a Data

View course ›

(DPO) Appointing a Data Protection Officer

Data Protection Officers have become more prevalent since the adoption of the European Union’s General Data Protection Regulation. Recent estimates suggest that, worldwide, more than 75,000 Data Protection Officers are needed. Upon successful completion of this course, you will know whether your organization needs one as well.

View course ›

(ECC) 4-1-1 About 9-1-1

This course will provide a history of 9-1-1, detail the process flow for emergency telephone calls, and introduce some of the legislation that currently governs emergency telephone calls. Although this course is tailored towards a North American audience, many of its principles are applicable everywhere.

View course ›

(GDP) Introduction to GDPR

The General Data Protection Regulation, or GDPR, is a set of rules designed to give European Union (EU) citizens more control over their personal data. Compliance with the GDPR is not restricted to organizations with physical locations in the EU; any organization that collects or processes EU citizens’ personal data

View course ›

(HDF) Help Desk Fundamentals

This course will provide common considerations to manage a help desk, implement best practices, identify common challenges, and provide considerations to mitigate those challenges for level 1, 2 and 3 support.

View course ›

(HWS) Hybrid WAN and SD-WAN: Determining Your Network Solution

As enterprises try to keep pace with demands of increasing network traffic, they are searching for cost-effective options to provide secure and reliable connections across the organization. Enterprises with multiple branches are finding that a hybrid approach to networking is an attractive solution since available services can vary widely across

View course ›

(IBP100) Preparing for a Bring Your Own Device Program

Many organizations today already have some form of a Bring Your Own Device (BYOD) program, while many others are investigating BYOD for their organization. For those looking to evaluate and prepare for a BYOD program, this course provides a three-step planning process to build the foundation for a BYOD program.

View course ›

(ICS) Developing a Telecom Service Inventory

The development of an inventory is the foundational concept of telecom environment management. The biggest challenge is knowing how and where to begin. This course shares the steps required to successfully create a telecom services inventory in your organization. Learn Efficiency First® best practices in inventory development and gain an

View course ›

(IDA) Invoice Inventory Best Practices for Data Accuracy

The cornerstone of any Telecom Expense Management (TEM) or Enterprise Mobility Management (EMM) program is the presence of an accurate and valid service and invoice inventory. You cannot contain costs within your telecom environment if you do not know what you have, where you have it, and how much it

View course ›

(IDP) Introduction to Data Privacy

This introductory course provides a foundational understanding of data privacy. Beyond introducing you to personally identifiable information, and the regional laws which protect it, this lesson covers Data Protection Officers and their relationship to data security. Although this course covers numerous Data Protection Authorities, and the rules they have implemented,

View course ›

(INF) International Telecom Fundamentals

International business is a complicated topic when you consider diversity in languages, currencies, cultures, market structure, geography, political climates, development, regulations, and standards, along with the organizations and governments involved. It is important to prepare for these differences when conducting international business.

View course ›

(IOT) IoT Deployment for Enterprise Verticals

This course will provide enterprises with an understanding of Internet of things (IoT) and how it can benefit enterprises by increasing business opportunities and productivity, along with gathering massive amounts of data for better customer insight. Included in this course are examples of how IoT can be used in many

View course ›

(IRV) Identifying The Right Telecom Vendor

The process of identifying, selecting, and evaluating the right telecom vendor for your organization is a daunting and difficult task. This course examines the first step of the process: identifying potential telecom vendors for your organization. In this course, you’ll learn how to examine your internal organizational needs, identify how

View course ›

(ISW) Implementing SD-WAN for your Enterprise

Many enterprises are choosing to implement Software-Defined Wide Area Network (SD-WAN) to reduce costs, increase bandwidth, and improve security. This course provides a plan for implementation, including pre- and post-implementation tasks and activities, that will assist the enterprise with network migration.

View course ›

(ITA) Introduction to Auditing

This introduction reviews fixed and mobile terminology and introduces you to common invoice errors and sample invoices. By the end of this course, you will be able to identify common billing errors and know where to look for them on invoices.

View course ›

(ITAD100) IT Asset Disposition: Fundamentals

An organization’s IT asset disposition policy asks, “How many working devices do I have and how many do I need to dispose?” With a focus on mobile devices, this course covers the benefits of an IT asset disposition program, the value proposition it offers, and the certifications which demonstrate sound

View course ›

(ITAD200) IT Asset Disposition: Requests for Proposal

A Request For Proposal (RFP) allows a service provider the opportunity to tell their story in a focused manner that is beneficial to the requestor. When trying to determine how to select a service provider, there are certain steps which need to be taken. This course provides an overview of

View course ›

(ITE) Invoices and Telecom Expense Management 101

In this course, you will gain an understanding of what telecom invoices are, which products and services are considered billable, and who will be receiving invoices. This will help you fully understand your organization’s telecom environment. You will become knowledgeable about Telecom Expense Management (TEM), its focus areas, and ways

View course ›

(ITF) Telecom Inventory Fundamentals

A complete and accurate inventory is the cornerstone of any successful telecom management practice. Telecom inventories provide essential information about your telecom environment and drive decision-making. This course provides a basic understanding of a telecom inventory and key areas to consider when creating an inventory of telecom assets and services.

View course ›

(ITM) Checklist for International Telecom Management

Global telecom and IT management programs present unique challenges beyond language barriers, cultural obstacles, regulatory considerations, and differences in currency. This course explores how to structure international telecom management teams, identify technological standards, implement international telecom policies and establish invoice payment and processing procedures.

View course ›

(ITT) International Telecom Terms

Ever feel like you need a telecom dictionary? The telecom industry is full of acronyms as well as technology, billing, contract, and regulatory terms. Understanding industry terminology directly influences your ability to communicate with telecom service providers, equipment vendors, and users. This course outlines the evolution of telecom terms, when

View course ›

(KPI) KPIs: Definitions & Reporting

Key Performance Indicators (KPIs) are an essential part of the Efficiency First® Framework. In this course, you will be introduced to instructions on how to create an effective KPI, how KPIs relate to the telecom environment, and how they fit into the Efficiency First® Framework. Stakeholder groups, as well as

View course ›

(KPS) Keys to Technology Expense Management (TEM) Program Success

This course outlines how to establish and sustain a successful Technology Expense Management Program. This course is ideal for all technology management practitioners and leaders. Throughout this course subject matter expert Timothy C. Colwell will share insights that will help you understand what contributes to TEM program success, how to

View course ›

(LM01) License Management Primer

This course, a non-technical primer covering UCaaS / CCaaS license management practices, is ideal for all technology management practitioners and leaders. Learn from subject matter expert Mark Bellingham, Vice President of Product Management at Calero-MDSL, during this course and gain a foundational understanding of license management as well as best

View course ›

(MBE) Invoice Auditing: MPLS Billing Errors

MPLS technology provides a fast, efficient technology for enterprises to utilize when routing data across networks. This course provides the learner both a background of how MPLS technology operates and the tools necessary to audit the MPLS invoice for common billing errors.

View course ›

(MCS) Telecom Expense Management: More Than Cost Savings

This course covers inventory validation, change control, and other telecom expense management activities. Telecom Expense Management (TEM) is frequently discussed in terms of hard and soft dollar savings. However, TEM activities should be incorporated into the broad practice of telecom environment management. Explore the benefits outside of hard and soft

View course ›

(MDM100) Mobile Device Management Strategy Overview

We live in a world that allows us to be constantly connected. Mobile Device Management (MDM) recognizes that telecom managers must learn to balance the benefits of mobility with the challenges of keeping sensitive corporate data secure. This course explores questions that need to be asked, stakeholders that need to

View course ›

(MID) Managing IoT Devices In Your Telecom Environment

As enterprises begin to leverage technology more fully into their telecom and IT departments, Internet of things (IoT) devices are being integrated. The unique characteristics of these devices requires vigilance. It is important to ensure that these devices are secure, inventory is accurate and validated, and that services are billed

View course ›

(MMC) Managing the MACD Process

Is your department challenged to keep up with ongoing Moves, Adds, Changes, and Disconnects (MACDs)? For many organizations, the constant activity around service changes encompasses a variety of technical, financial, and operational elements. This course offers a checklist to gauge the overall health of your MACD management practice. Learn activities

View course ›

(MMPD) Mobility Management Program Design Primer

Subject matter experts Abdul Elantably, Product Manager at Motus, and Chuck Serapilio, VP of Sales at Motus, share insights and best practices throughout this course that will help you gain a foundational understanding of mobility management program design and mobility management program performance.

 


 

Thank you to

View course ›

(MPF) Mobile Policy: Fundamentals

This course shows how to create, manage, and audit a mobile policy. It explains common components of the mobile policy, how to create a mobile policy, and what is important to manage during the mobile policy lifecycle.

View course ›

(MSA) Mobile Service Analysis

Validating mobile invoice accuracy, correcting exceptions, and recovering overcharges are necessary mobility management activities. This course explores foundational principles that support mobile service analysis practices.

View course ›

(MSM) Mobile Security Management

The use of mobile devices for everyday business is increasing. This means that organizations need to take a new look at their data security policies. Specifically, those that allow the use of mobile devices to access corporate networks. Regardless of whether employees use their own devices or corporate-issued devices, security

View course ›

(MSP) Managing An Enterprise Telecom Security Plan

This course is an overview of managing a telecom security plan implementation. It walks the project manager through how to manage a project plan and what the phases are for implementing a telecom security plan. It provides details for common tasks and regulations to keep in mind and identify what

View course ›

(MSS) Mobile Service Components

Mobile devices are extremely important to your telecom environment. Whether your company implements a Bring Your Own Device (BYOD) program or not, chances are most, if not all, employees in your organization own or use a mobile device. This brief introductory course breaks down the components of voice and data

View course ›

(MTR) Managing TEM Supplier Relationships

Successful relationships with TEM vendors require a proactive management plan. Outsourced TEM program activities can be complex in implementation, cost, and scope, requiring a strong approach to building and maintaining an efficacious relationship with the TEM vendor. The information shared will enable you to improve the value of your business

View course ›

(MVP) Managing Vendor Performance & Accountability

There are four stages of vendor relationship management: pre-contract, new service, mid-term, and separation. During this course, you will be able to develop a plan, consider all facets of your organization’s relationship with vendors, and learn how to manage vendors utilizing performance metrics and adherence to Service Level Agreements (SLAs)

View course ›

(NPM) The ROI of Network Performance Management

Managing network performance is an important function within any IT department. Previously, network performance management consisted of verifying that devices were up and running and monitoring packet loss. Today, due to an increase in the number of business applications and services that are relied on for day-to-day operations, it has

View course ›

(OME) Optimizing Mobile Environments

This course explores mobile environment components including equipment, coverage, and applications as well as different types of plans that can be implemented within your mobile environment. Optimal cost per minute is also discussed.

View course ›

(PAN100) Pandemic Preparedness

Pandemics can affect all departments of all types or organizations, so it’s important to plan for your telecom, mobility, and IT needs in the event of a pandemic. This course not only provides important definitions related to pandemics, but also guides you through a four-step pandemic planning process to help

View course ›

(PIA) Passport to International Telecom – Asia-Pacific Region

In this course, you will learn about the countries in the Asia-Pacific region and the fundamental characteristics that affect telecommunications markets, their regulatory structures, consumer protections, and international cooperation between countries in the area. You will also understand the status of telecommunications in major markets in the Asia-Pacific region.

View course ›

(PIB01) POTS-in-a-Box Solutions Primer

This course, a primer on POTS-in-a-Box solutions, is ideal for all technology management practitioners and leaders. Throughout this course you will learn best practices from subject matter expert Greg Herman, Director of Mobile Solutions at MetTel, that will help you understand the business applications, use cases, and consideration for selecting

View course ›

(PIE) Passport to International Telecom – Europe Region

In this course, you will learn about the characteristics of countries in the Europe region that affect telecommunications. The first section covers the region’s fundamentals, followed by specifics in the European Union (EU), including regulatory structures, national regulatory authorities, and the General Data Protection regulation (GDPR). Examine the European Commission’s

View course ›

(PIP) Introduction to PIPEDA (Canada)

The Personal Information Protection and Electronic Documents Act, or PIPEDA, is a set of rules designed to promote trust of electronic commerce among Canadian citizens. Compliance with PIPEDA is not restricted to organizations with physical locations in affected provinces; any organization that collects or processes Canadian citizens’ personal data is

View course ›

(PIS) Introduction to the PIS Specification (China)

The Personal Information Security Specification, or PIS Specification, is a systematic, national standard set by the People’s Republic of China in order to protect personal information and how it is shared both domestically and abroad. It lays out detailed new regulations for user consent as well as how personal data

View course ›

(POM) Post-Migration Validation

Moving to any new technology, services and systems requires careful project planning before, during, and after the change. Successful projects require both technical and financial validation. In this new course, learn how to apply best practices to minimize technical and financial risk in enterprise migration projects.

View course ›

(PPC) Project Plan: Implementing a New Service Contract

Implementing a new telecom service contract — even when performed with the same provider — can be burdensome and challenging. You need to give special consideration to the many telecom management activities to be performed before, during, and after implementation. This course focuses on creating a project plan for developing

View course ›

(PST) PSTN Transitioning

This course will provide an overview of what Public Switched Telephone Network (PSTN) transitioning is, what enterprises need to know and how they should prepare for it. The Federal Communications Commission (FCC) has accelerated the timeline on transitioning the legacy technology in the public switched telephone network to IP-based services.

View course ›

(PUC) How to Plan a Unified Communications Migration

This course is an overview of how to plan a Unified Communications (UC) migration. As UC adoptions increase, the IT/telecom teams within enterprises need a detailed guide for migrating from traditional business telecom platforms to UC. There is a large increase in UC adoption, and the interest in UC has

View course ›

(PVM) Project Managing a VoIP Migration

Organizations that migrate to Voice over IP (VoIP) often rely on vendors to manage all aspects of the migration, however, developing an internal project plan provides visibility into dependencies and risks. This course explains how to prepare for a VoIP migration and gives guidance on appropriate milestone markers to ensure

View course ›

(RBM) Remote Telecom: Beyond Mobility

This course will provide knowledge into the remote technologies of telecom. It will cover challenges of remote technologies and mitigations to those challenges. It will give an overview of each technology and the best practices for securing those technologies.

View course ›

(RDB) Reporting a Data Breach

Although data breaches are a routine part of the 24-hour news cycle, there is a misunderstanding of what they are. In addition, because each state (and nation) has different criteria for who should be notified and for how quickly an organization must react, developing adequate policies and procedures is often

View course ›

(ROK) AOTMP Recommended Organizational KPIs

Historically, fixed and mobile services have been managed as utilities. This course presents learners with five, high-level Key Performance Indicators (KPIs) they can begin implementing within their organizations immediately to change the perception of telecom as a utility into a strategic business asset. Learners will be provided with the ability

View course ›

(RPA100) Understanding Robotic Process Automation

Robotic Process Automation is a rules-based procedure that guides a software “robot” in completing the steps a worker would perform when completing the same task. Now that you know what Robotic Process Automation is, you can start to better understand how it can benefit your organization. These benefits may include

View course ›

(SaaS01) SaaS Inventory Management

This course focuses on establishing a solid foundation for effective SaaS management. You’ll learn how to create and maintain a comprehensive inventory of all SaaS applications within your organization, ensuring complete visibility into your software ecosystem. The course covers techniques for documenting crucial application details and identifying departmental ownership, providing

View course ›

(SDW) Key Considerations for SD-WAN Migrations

As cloud use increases, having a greater understanding of options beyond Multiprotocol Label Switching (MPLS) – based connectivity is imperative to making sure your enterprise optimizes the telecom environment. There are multiple reasons why a company might choose to use Software-Defined Wide Area Network (SD-WAN) to connect teams across geographic

View course ›

(SIP100) SIP Trunking: A Primer

Unlike traditional telephony where bundles of physical wires are delivered from telecom service providers to enterprises, Session Initiation Protocol (SIP) trunks allow organizations to replace fixed Public Switched Telephone Network (PSTN) lines with PSTN connectivity via IP. SIP trunks may offer significant cost savings for enterprises, eliminating the need for

View course ›

(SOP240) Understanding Service Level Agreements

Service Level Agreements (SLAs) help improve relationships between service providers and customers by protecting enterprise network integrity and financial interests. Understanding SLAs and how to monitor them is necessary for effective contract negotiation. This course helps participants understand the types of SLAs they may encounter and the language they are

View course ›

(STP02) Using an RFP to Select a TEM Vendor

Telecom Expense Management (TEM) technology and professional services providers can deliver expertise to enhance telecom environment management. The technology systems and professional services available are broad and meet a variety of needs. As the TEM provider market evolves and options expand, careful evaluation and selection of the best provider for

View course ›

(TBS) Telecom Budgeting Strategies

Budgeting is an integral part of telecom management. Understanding current and future financial telecom requirements enables professionals to meet the service needs and financial objectives of the organization. This course shares proven practices, strategies, and tools to support telecom professionals in budget planning, budget development, and budget management activities.

View course ›

(TCM) Telecom Inventory: Collateral Materials

In order to have a completely thorough and up-to-date inventory for your organization, it is necessary to include several types of collateral materials. This course covers these different types of materials, as well as important components within each. At the end of the course, you will recognize the importance of

View course ›

(TCP) The Cloud: A Primer

The cloud is becoming increasingly important in telecom strategy. This course identifies the characteristics of the cloud, introduces the three types of cloud infrastructures, and reviews the benefits of implementing cloud services.

View course ›

(TDS) Telecom Trends: Data Services

Data services have reached a tipping point as more travel across service provider networks. The ability of an organization to adapt to the everchanging telecom industry is critical to technical, financial, and operational efficiency. Learn what an organization needs to know to leverage today’s data technologies and effectively migrate to

View course ›

(TEC100) VoIP: A Primer

This course provides a high-level overview of Voice over Internet Protocol (VoIP), including a brief history of telephone systems, an exploration of computer networking, introduction to terms and technologies used to send VoIP calls, and explanation of the drivers behind VoIP migration.

View course ›

(TEC101) SIP Technology Overview

This course provides a high-level overview of session initiation protocol (SIP). This overview includes a brief history, benefits, applications, features, how this technology relates to Efficiency First ® Framework, and appropriate KPIs.

View course ›

(TEM) Developing a Telecom Expense Management Plan

The Telecom Expense Management (TEM) market space is occupied by a myriad of service and software providers as well as consultants all proposing solutions to the customer’s desire to control and optimize telecom cost. With many offerings available, what should customers consider when developing and implementing a TEM plan? This

View course ›

(TIO01) Technology Expense Management (TEM) Industry Overview

This course, an overview of the Technology Expense Management Industry, is ideal for all technology management practitioners and leaders. Throughout this course subject matter expert Timothy C. Colwell will share insights that will help you to navigate the industry, learn how TEM supports business, understand vendor types you will encounter,

View course ›

(TIR01) TEM Implementation Readiness

This course, a primer on technology expense management (TEM) implementation readiness, is ideal for all technology management practitioners and leaders. Throughout this course you will learn best practices from subject matter expert John Venditti, SVP of Client Services & Delivery at Sakon, that will help you prepare for a successful

View course ›

(TOT) Tools of the Trade

Technology support staff roles can be varied. Having knowledge of the right tools for any job can make the difference between working smarter and working harder. This course identifies common tools used daily by enterprises and telecom service providers. Gain an in-depth understanding of the resources to take advantage of

View course ›

(TPD) Technology Expense Management (TEM) Program Design

This course explores technology expense management (TEM) program design and is ideal for all technology management practitioners and leaders. Throughout this course subject matter expert Timothy C. Colwell will share design best practices that address program considerations, program objectives, common business systems, and program teams and workstreams. You’ll also learn

View course ›

(TPM) Telecom Project Management

The management of telecom projects can be complex. Although there are many different types of telecom projects, the methodology remains the same. This course defines a standardized project management process for technical, administrative, and financial projects.

View course ›

(TPP) Technology Planning and Selection Process

In many organizations, technology planning and selection occurs as the result of a top-down approach. This can result in an organization moving to a new technology that does not fully support its business application needs. This course defines a process for creating the optimal technology planning and selection environment.

View course ›

(TRI) Thinking Constructively About TEM ROI

In an enterprise, most functions are categorized as either cost centers or profit centers. Telecom Expense Management (TEM) produces a more tangible ROI than many other technology projects, yet 66% of executives view TEM programs as cost centers. This course explores and supports the viewpoint that TEM programs should be

View course ›

(TSC) Telecom Security: Cloud Security

Cloud computing represents one of the largest and fastest-growing technologies in telecom. More and more enterprises are moving to a cloud model to save money, improve efficiency, and gain access to improved Artificial Intelligence (AI) or neural networks. However, there are increased risks to the security of the data stored

View course ›

(TSE) Telecom Security: Environmental/Physical Security

This course is an overview of environmental and physical security. Environmental security covers environmental threats to telecom equipment. Physical security covers the protection of telecom personnel and equipment. This course provides best practices, standards and mitigation procedures to reduce risk and these explain the measures to consider to secure enterprise

View course ›

(TSI) Telecom Security: Information Security

While telecom data is not specifically named in all regulations, it is advisable to treat the data in the same regard as other data required to be secured and kept confidential. This course will show the important considerations for telecom information security. It will provide best practices and standards and

View course ›

(TSO) Telecom Security: An Overview

This course is an overview of telecom security. There are three main parts to telecom security: information, environmental/physical, and systems. This course will provide security considerations for non-security personnel as well as security considerations for telecom professionals. We will provide a heightened level of security and describe how it relates

View course ›

(TSS) Telecom Security: Systems Security

Systems security covers any threat that usually results in data leakage or data forgery that allows for unauthorized access, Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks, malicious or abnormal traffic transfer to unauthorized systems, eavesdropping, interruption, system jamming, hijacking, and data gathering. Equipment software, firmware, and

View course ›

(TT) Telecom Terms: Mastering the Fundamentals

Ever feel like you need a telecom dictionary? The telecom industry is full of acronyms and technology, billing, contract and regulatory terms. Understanding industry terminology directly influences your ability to communicate with telecom service providers, equipment vendors and users.

View course ›

(UCA) Understanding Cloud Architecture

With the exponential growth in cloud utilization, it is imperative for an enterprise’s telecom team to understand the key components of cloud architecture. There are multiple levels of functionality, potential cost and infrastructure support that need to be evaluated at an operational level to determine what cloud solution makes the

View course ›

(UCM) Unified Communications for Mobility

This course enables a telecom manager or planner to understand the specific needs of mobility in Unified Communications (UC), as well as the best practices for implementing and managing the two technologies together. As more businesses adopt UC, telecom managers need to know how it can impact the mobile technology

View course ›

(UCO) Unified Communications Technology Overview

This course provides a high-level overview of Unified Communications, including a brief history of the communication solution. The course touches on the benefits, applications, and features of Unified Communications as well as how it relates to the Efficiency First® Framework.

View course ›

(UCP) Creating and Implementing a UC Management Policy

All enterprises that migrate to Unified Communications (UC) should have a clear policy for managing its functions. There are multiple ways in which the lack of clear policy can lead to low user adoption and potential misuse of the UC features. It is necessary to communicate expectations for the adoption

View course ›

(VPS) Validating Services: Physical/Site Audit

An accurate inventory is essential to have full visibility into the telecom environment. The second step in the inventory auditing process is Analyze and Catalog. One important technique in this step is conducting a physical/site audit. The information gleaned from this audit can provide valuable information and influence decision making.

View course ›

(WAO) Wireless Service Audit & Optimization

Wireless service was once projected to be a niche market. However, in today’s business environment nothing could be further from reality. With the advent of text messaging, downloads, internet access, and camera phone capabilities, the audit and optimization challenges that come with wireless service are often more complex than traditional

View course ›

(WDS) Wireless Device Security

There are 276.6 million wireless subscribers in the US, representing an 89% wireless penetration rate. Associated with this overall rise in wireless usage is the increase in wireless security challenges within an enterprise. How is confidential, sensitive, and valuable business data at risk? What measures and policies can be put

View course ›

(WMS) Wireless Management Strategies

Wireless usage can vary dramatically from month to month across an organization, and wireless services that are not managed can lead to budget waste. This course focuses on two key strategies to effectively manage wireless services.

View course ›

"*" indicates required fields

Name*
This field is for validation purposes and should be left unchanged.